![]() ![]() When you have multiple remote access policies configured, you can use the system event log to determine the name of the remote access policy that either accepted or rejected the connection attempt (see Policy-Name in the event description). Viewing the authentication attempts in this log is useful when you want to troubleshoot remote access policies. Policy-Name = Wireless Remote Access PolicyĮAP-Type = Smart Card or other Certificate Fully-Qualified-User-Name = /Users/Client NAS-IP-Address = 10.7.0.4 NAS-Identifier = Client-Friendly-Name = Building 7 Wireless AP Client-IP-Address = 10.7.0.4 NAS-Port-Type = Wireless-IEEE 802.11 NAS-Port = 6 ![]() The following is an example of the description for a successful authentication event seen in the event viewer. IAS Event Logging and To troubleshoot IAS authentication attempts in the system event log, ensure that Event Viewer you enable event logging for all types of IAS events (rejected, discarded, and successful authentication events). ![]() Introduction To help you gather information to troubleshoot problems with IAS, you can use the following tools. Allow you to view IAS authentication attempts in the system event logĪllows you to view RADIUS authentication and accounting messages that are sent to and from the IAS serverĪllows you to troubleshoot complex problems for specific componentsĪllows you to monitor status information for your IAS serverĪllow you to use charts and reports to determine how efficiently your server uses IAS and to identify and troubleshoot potential problems ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |